|
Journals in DBLP
- Einar Snekkenes
Preface to the special issue on ESORICS 2003. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:3, pp:133-134 [Journal]
- Michael Backes, Birgit Pfitzmann, Michael Waidner
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal]
- David von Oheimb, Volkmar Lotz, Georg Walter
Analyzing SLE 88 memory management security using Interacting State Machines. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:3, pp:155-171 [Journal]
- Andrei Serjantov, Peter Sewell
Passive-attack analysis for connection-based anonymity systems. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:3, pp:172-180 [Journal]
- David A. Basin, Sebastian Mödersheim, Luca Viganò
OFMC: A symbolic model checker for security protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:3, pp:181-208 [Journal]
- Jonathan T. Trostle, Bill Gossman
Techniques for improving the security and manageability of IPsec policy. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:3, pp:209-226 [Journal]
|